pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/security/pam_ssh_agent_auth



Module Name:    pkgsrc
Committed By:   nia
Date:           Sat Apr 10 09:10:11 UTC 2021

Modified Files:
        pkgsrc/security/pam_ssh_agent_auth: Makefile PLIST distinfo
Added Files:
        pkgsrc/security/pam_ssh_agent_auth/patches: patch-Makefile.in
            patch-ssh-ecdsa.c
Removed Files:
        pkgsrc/security/pam_ssh_agent_auth/patches: patch-aa patch-ab patch-ac

Log Message:
pam_ssh_agent_auth: update to 0.10.4

- fixed build with openssl 1.1.
- grabbed some fixes from FreeBSD.
- now uses the new GITHUB_SUBMODULES - thx ryoon!


To generate a diff of this commit:
cvs rdiff -u -r1.9 -r1.10 pkgsrc/security/pam_ssh_agent_auth/Makefile
cvs rdiff -u -r1.1.1.1 -r1.2 pkgsrc/security/pam_ssh_agent_auth/PLIST
cvs rdiff -u -r1.3 -r1.4 pkgsrc/security/pam_ssh_agent_auth/distinfo
cvs rdiff -u -r0 -r1.1 \
    pkgsrc/security/pam_ssh_agent_auth/patches/patch-Makefile.in \
    pkgsrc/security/pam_ssh_agent_auth/patches/patch-ssh-ecdsa.c
cvs rdiff -u -r1.1.1.1 -r0 \
    pkgsrc/security/pam_ssh_agent_auth/patches/patch-aa \
    pkgsrc/security/pam_ssh_agent_auth/patches/patch-ab \
    pkgsrc/security/pam_ssh_agent_auth/patches/patch-ac

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/security/pam_ssh_agent_auth/Makefile
diff -u pkgsrc/security/pam_ssh_agent_auth/Makefile:1.9 pkgsrc/security/pam_ssh_agent_auth/Makefile:1.10
--- pkgsrc/security/pam_ssh_agent_auth/Makefile:1.9     Fri Apr 24 11:41:37 2020
+++ pkgsrc/security/pam_ssh_agent_auth/Makefile Sat Apr 10 09:10:11 2021
@@ -1,20 +1,23 @@
-# $NetBSD: Makefile,v 1.9 2020/04/24 11:41:37 nia Exp $
+# $NetBSD: Makefile,v 1.10 2021/04/10 09:10:11 nia Exp $
 
-DISTNAME=      pam_ssh_agent_auth-0.9.2
-PKGREVISION=   2
+DISTNAME=      pam_ssh_agent_auth-0.10.4
 CATEGORIES=    security
-MASTER_SITES=  ${MASTER_SITE_SOURCEFORGE:=pamsshagentauth/}
-EXTRACT_SUFX=  .tar.bz2
+MASTER_SITES=  ${MASTER_SITE_GITHUB:=jbeverly/}
+GITHUB_TAG=    ${DISTNAME}
 
 MAINTAINER=    agc%NetBSD.org@localhost
-HOMEPAGE=      https://sourceforge.net/projects/pamsshagentauth/
+HOMEPAGE=      https://github.com/jbeverly/pam_ssh_agent_auth
 COMMENT=       PAM module which permits authentication via ssh-agent
 LICENSE=       modified-bsd
 
-BROKEN=                "Fails to build with OpenSSL 1.1"
-
 GNU_CONFIGURE= yes
 USE_TOOLS+=    pod2man
 
+GITHUB_SUBMODULES+=    floodyberry ed25519-donna 8757bd4cd209cb032853ece0ce413f122eef212c ed25519-donna
+
+CONFIGURE_ARGS+=       --without-openssl-header-check
+
+INSTALLATION_DIRS+=    ${PKGMANDIR}/man8
+
 .include "../../security/openssl/buildlink3.mk"
 .include "../../mk/bsd.pkg.mk"

Index: pkgsrc/security/pam_ssh_agent_auth/PLIST
diff -u pkgsrc/security/pam_ssh_agent_auth/PLIST:1.1.1.1 pkgsrc/security/pam_ssh_agent_auth/PLIST:1.2
--- pkgsrc/security/pam_ssh_agent_auth/PLIST:1.1.1.1    Fri Dec 11 19:48:12 2009
+++ pkgsrc/security/pam_ssh_agent_auth/PLIST    Sat Apr 10 09:10:11 2021
@@ -1,3 +1,3 @@
-@comment $NetBSD: PLIST,v 1.1.1.1 2009/12/11 19:48:12 agc Exp $
+@comment $NetBSD: PLIST,v 1.2 2021/04/10 09:10:11 nia Exp $
 libexec/pam_ssh_agent_auth.so
 man/man8/pam_ssh_agent_auth.8

Index: pkgsrc/security/pam_ssh_agent_auth/distinfo
diff -u pkgsrc/security/pam_ssh_agent_auth/distinfo:1.3 pkgsrc/security/pam_ssh_agent_auth/distinfo:1.4
--- pkgsrc/security/pam_ssh_agent_auth/distinfo:1.3     Wed Nov  4 01:18:00 2015
+++ pkgsrc/security/pam_ssh_agent_auth/distinfo Sat Apr 10 09:10:11 2021
@@ -1,9 +1,12 @@
-$NetBSD: distinfo,v 1.3 2015/11/04 01:18:00 agc Exp $
+$NetBSD: distinfo,v 1.4 2021/04/10 09:10:11 nia Exp $
 
-SHA1 (pam_ssh_agent_auth-0.9.2.tar.bz2) = 0f3d9455a8f983907cfad293105cfb16c4a08a0a
-RMD160 (pam_ssh_agent_auth-0.9.2.tar.bz2) = 2ef2a4dbb1f3115751f596629c0518e65500cdf4
-SHA512 (pam_ssh_agent_auth-0.9.2.tar.bz2) = e710a4dff315c8d79c5d5edc4ebe1629a8fc6d09651813fd4792a2021e7c2d5768d6b7e8539801e31b947cc30817f32375d751fc396707fc4f257df4f33cd408
-Size (pam_ssh_agent_auth-0.9.2.tar.bz2) = 237156 bytes
-SHA1 (patch-aa) = a32866ae59734b94c55a3531094bbd6b6d9cdbfc
-SHA1 (patch-ab) = 9ef4711ea6a65a627e581d8905a3a9f8ef0cf202
-SHA1 (patch-ac) = ade7a45c5e42307ee0e9ffbdbd708a6fef64ada0
+SHA1 (floodyberry-ed25519-donna-8757bd4cd209cb032853ece0ce413f122eef212c.tar.gz) = 5cf66843d4f66fea1117bc44a8d4c94eaeeda840
+RMD160 (floodyberry-ed25519-donna-8757bd4cd209cb032853ece0ce413f122eef212c.tar.gz) = bca5b0cb7d314bc72ba37415b557d618d6705b2f
+SHA512 (floodyberry-ed25519-donna-8757bd4cd209cb032853ece0ce413f122eef212c.tar.gz) = 
5e8b838bc66bdb1983e62b0ae969449741a3fb223198bce26fe3a8996e324728e8ba0e5259f9ef3db613fd484db21459e98c39367f7240940bc537210c6d7f63
+Size (floodyberry-ed25519-donna-8757bd4cd209cb032853ece0ce413f122eef212c.tar.gz) = 1169972 bytes
+SHA1 (pam_ssh_agent_auth-0.10.4.tar.gz) = 66dd8274346fd006ff40f525c082cfb701085b5f
+RMD160 (pam_ssh_agent_auth-0.10.4.tar.gz) = d4c02cb47d096ac261d1cb15791483c5c7261f12
+SHA512 (pam_ssh_agent_auth-0.10.4.tar.gz) = caccf72174d15e43f4c86a459ac6448682e62116557cf1e1e828955f3d1731595b238df42adec57860e7f341e92daf5d8285020bcb5018f3b8a5145aa32ee1c2
+Size (pam_ssh_agent_auth-0.10.4.tar.gz) = 307110 bytes
+SHA1 (patch-Makefile.in) = fd95237832ab5a30b38a9544462a124e2fd81a2d
+SHA1 (patch-ssh-ecdsa.c) = edc122ec4ad70d92d507c399775d4c112cf4f10c

Added files:

Index: pkgsrc/security/pam_ssh_agent_auth/patches/patch-Makefile.in
diff -u /dev/null pkgsrc/security/pam_ssh_agent_auth/patches/patch-Makefile.in:1.1
--- /dev/null   Sat Apr 10 09:10:12 2021
+++ pkgsrc/security/pam_ssh_agent_auth/patches/patch-Makefile.in        Sat Apr 10 09:10:11 2021
@@ -0,0 +1,15 @@
+$NetBSD: patch-Makefile.in,v 1.1 2021/04/10 09:10:11 nia Exp $
+
+Do not install manpages to catpage directories.
+
+--- Makefile.in.orig   2019-07-08 16:36:13.000000000 +0000
++++ Makefile.in
+@@ -148,7 +148,7 @@ install: $(CONFIGFILES) $(MANPAGES) $(PA
+ install-files:
+       $(srcdir)/mkinstalldirs $(DESTDIR)$(libexecdir)
+       $(srcdir)/mkinstalldirs $(DESTDIR)$(mandir)/$(mansubdir)8
+-      $(INSTALL) -m 644 pam_ssh_agent_auth.8 $(DESTDIR)$(mandir)/$(mansubdir)8/pam_ssh_agent_auth.8
++      $(INSTALL) -m 644 pam_ssh_agent_auth.8 $(DESTDIR)$(mandir)/man8/pam_ssh_agent_auth.8
+       $(INSTALL) -m 755 pam_ssh_agent_auth.so $(DESTDIR)$(libexecdir)/pam_ssh_agent_auth.so
+ 
+ uninstallall: uninstall
Index: pkgsrc/security/pam_ssh_agent_auth/patches/patch-ssh-ecdsa.c
diff -u /dev/null pkgsrc/security/pam_ssh_agent_auth/patches/patch-ssh-ecdsa.c:1.1
--- /dev/null   Sat Apr 10 09:10:12 2021
+++ pkgsrc/security/pam_ssh_agent_auth/patches/patch-ssh-ecdsa.c        Sat Apr 10 09:10:11 2021
@@ -0,0 +1,52 @@
+$NetBSD: patch-ssh-ecdsa.c,v 1.1 2021/04/10 09:10:11 nia Exp $
+
+Fix segfault when handling ECDSA keys
+
+Import patch by Marc Deslauriers from the Ubuntu package of pam_ssh_agent_auth
+
+Ref: https://github.com/jbeverly/pam_ssh_agent_auth/pull/24/files
+     https://github.com/jbeverly/pam_ssh_agent_auth/issues/18
+     https://bugs.launchpad.net/ubuntu/+source/pam-ssh-agent-auth/+bug/1869512
+
+--- ssh-ecdsa.c.orig   2019-07-08 16:36:13.000000000 +0000
++++ ssh-ecdsa.c
+@@ -46,7 +46,7 @@ ssh_ecdsa_sign(const Key *key, u_char **
+     u_int len, dlen;
+     Buffer b, bb;
+ #if OPENSSL_VERSION_NUMBER >= 0x10100005L
+-      BIGNUM *r, *s;
++      BIGNUM *r = NULL, *s = NULL;
+ #endif
+ 
+     if (key == NULL || key->type != KEY_ECDSA || key->ecdsa == NULL) {
+@@ -137,20 +137,27 @@ ssh_ecdsa_verify(const Key *key, const u
+ 
+     /* parse signature */
+     if ((sig = ECDSA_SIG_new()) == NULL)
+-        pamsshagentauth_fatal("ssh_ecdsa_verify: DSA_SIG_new failed");
++        pamsshagentauth_fatal("ssh_ecdsa_verify: ECDSA_SIG_new failed");
+ 
+     pamsshagentauth_buffer_init(&b);
+     pamsshagentauth_buffer_append(&b, sigblob, len);
+ #if OPENSSL_VERSION_NUMBER < 0x10100005L
+     if ((pamsshagentauth_buffer_get_bignum2_ret(&b, sig->r) == -1) ||
+         (pamsshagentauth_buffer_get_bignum2_ret(&b, sig->s) == -1))
++        pamsshagentauth_fatal("ssh_ecdsa_verify:"
++            "pamsshagentauth_buffer_get_bignum2_ret failed");
+ #else
+-    DSA_SIG_get0(sig, &r, &s);
++    if ((r = BN_new()) == NULL)
++        pamsshagentauth_fatal("ssh_ecdsa_verify: BN_new failed");
++    if ((s = BN_new()) == NULL)
++        pamsshagentauth_fatal("ssh_ecdsa_verify: BN_new failed");
+     if ((pamsshagentauth_buffer_get_bignum2_ret(&b, r) == -1) ||
+         (pamsshagentauth_buffer_get_bignum2_ret(&b, s) == -1))
+-#endif
+         pamsshagentauth_fatal("ssh_ecdsa_verify:"
+             "pamsshagentauth_buffer_get_bignum2_ret failed");
++    if (ECDSA_SIG_set0(sig, r, s) != 1)
++        pamsshagentauth_fatal("ssh_ecdsa_verify: ECDSA_SIG_set0 failed");
++#endif
+ 
+     /* clean up */
+     memset(sigblob, 0, len);



Home | Main Index | Thread Index | Old Index